www.removal-removal.com
Open in
urlscan Pro
185.52.53.247
Malicious Activity!
Public Scan
Submission: On July 26 via automatic, source phishtank
Summary
This is the only time www.removal-removal.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: CapitalOne (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 185.52.53.247 185.52.53.247 | 60558 (SECUREDSE...) (SECUREDSERVERS-) | |
16 | 1 |
ASN60558 (SECUREDSERVERS-, EU)
PTR: eu-ams1.websitelayer.com
www.removal-removal.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
removal-removal.com
www.removal-removal.com |
79 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
16 | www.removal-removal.com |
www.removal-removal.com
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.removal-removal.com/cap/cap0l/home/
Frame ID: 23330.1
Requests: 16 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.removal-removal.com/cap/cap0l/home/ Redirect Chain
|
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header.png
www.removal-removal.com/cap/cap0l/home/images/ |
302 B 302 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
www.removal-removal.com/cap/cap0l/home/images/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
capital.png
www.removal-removal.com/cap/cap0l/home/images/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
line.png
www.removal-removal.com/cap/cap0l/home/images/ |
317 B 317 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login%201.png
www.removal-removal.com/cap/cap0l/home/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
linneee.png
www.removal-removal.com/cap/cap0l/home/images/ |
172 B 172 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login%202.png
www.removal-removal.com/cap/cap0l/home/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buttom.png
www.removal-removal.com/cap/cap0l/home/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
open.png
www.removal-removal.com/cap/cap0l/home/images/ |
182 B 182 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign.png
www.removal-removal.com/cap/cap0l/home/images/ |
158 B 158 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
line2.png
www.removal-removal.com/cap/cap0l/home/images/ |
211 B 211 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer.png
www.removal-removal.com/cap/cap0l/home/images/ |
38 KB 38 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dont.png
www.removal-removal.com/cap/cap0l/home/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
for.png
www.removal-removal.com/cap/cap0l/home/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pass.png
www.removal-removal.com/cap/cap0l/home/images/ |
777 B 777 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: CapitalOne (Financial)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.removal-removal.com
185.52.53.247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